Middlesex University

Displaying 1-24 of 24 results

Server cluster is one of the clustering technologies; it is use for the improvement of the PC's performance; cluster use for the high performance of computing system. It is based on the model of the cluster architecture. This model is refers that how servers manage in the cluster. Server cluster...

Cloud computing has been visualized as the next generation architecture of IT enterprise. In contrast to traditional solutions, where the IT services are under proper physical, logical and personnel controls, cloud computing moves the application software and databases to the large data centers, where the management of the data and...

The Locator/ID Separation Protocol (LISP) is a routing architecture that provides new semantics for IP addressing. In order to simplify routing operations and improve scalability in future Internet, the LISP uses two different numbering spaces to separate the device identifier from its location. In other words, the LISP separates the...

Energy efficiency is the main concern of research community while designing routing protocols for Wireless Sensor Networks (WSNs). This concern can be addressed by using energy-harvesting scheme in routing protocols. In this paper, the authors propose a secure routing protocol that is based on cross layer design and energy-harvesting mechanism....

In this paper, the authors present a new analytical model to enhance the modeling of vertical handover for integrated cellular/WLAN systems. The WLAN system considered is within the coverage area of cellular network; hence users can have a downward vertical handover to the WLAN and/or an upward vertical handover to...

This paper considers retransmission mechanisms in wireless regenerative relay networks. The retransmission can be realized in a cooperative manner with the assistance of all available relays. This may result in high overall power consumption due to a considerable number of overlapped packets in the retransmission, especially when the number of...

Unlike current closed systems such as 2nd and 3rd generations where the core network is controlled by a sole network operator, multiple network operators will coexist and manage the core network in Next Generation Networks (NGNs). This open architecture and the collaboration between different network operators will support ubiquitous connectivity...

An increasingly wireless world will mean that devices with multiple network interfaces will soon become commonplace. Users will expect to be always connected from anywhere and at any time as connections will be switched to available networks using handover techniques. However, different networks have different Qualities of Service (QoS) so...

Being able to understand human behaviour and monitoring daily life activities is seen as a significant approach for alleviating functional decline among elderly people. The aim of this paper is to investigate a mechanism that can recognise high level activities and behaviour of low entropy people in order to help...

Business and ICT strategic alignment remains an ongoing challenge facing organizations as they react to changing requirements by adapting or introducing new technologies to existing infrastructure. Enterprise Architecture (EA) has increasingly become relevant to these demands and as a consequence numerous methods and frameworks have emerged. However these approaches remain...

The hitherto limited interpretation of service as deployed in IT value creation and solutions implementation is perhaps a reason why so few IT projects are seen to have successful business outcomes. There are strong indications that the commonly used measures of quality and performance have never been adequate for complex...

Mobile devices with two network interfaces (Wi-Fi and 3G) are already commercially available. Point-to-point communications such as Infrared and Bluetooth are also readily used. In the near future, mobile phones will have several interfaces including satellite and new technologies such as ultra wideband. Hence, the authors must assume that such...

Seamless connectivity in 4G wireless networks requires the development of intelligent proactive mechanisms for efficiently predicting vertical handovers. Random device mobility patterns further increase the complexity of the handover process. Geographical topologies such as indoor and outdoor environments also exert additional constraints on network coverage and device mobility. The ability...

Multi-channel MAC protocols have recently obtained considerable attention in wireless networking research because they promise to increase capacity of wireless networks significantly by exploiting multiple frequency bands. In this paper, the authors do a comparison between IEEE 802.11 and IEEE 802.15.4 and investigate the performance between both using simulations conducted...

Security for Next Generation Networks (NGNs) is an attractive topic for many research groups. The Y-Comm security group believes that a new security approach is needed to address the security challenges in 4G networks. This paper sheds light on the authors' approach of providing security for the Y-Comm architecture as...

3D virtual worlds, such as Second Life, are increasingly being used for delivering e-learning for different genres of students. As part of an ongoing research to evaluate different digital design aspects of using these emergent virtual learning environments, the aim of this paper is to investigate whether the overall satisfaction...

There is no credible methodology for Knowledge Management Systems Development (KMSD). The authors report on a KMSD approach that has emerged from an investigation based on action research and grounded theory into a number of business problems experienced by organizations. The KMSD approach is highly participatory, requiring full involvement of...

The main feature of the next generation wireless communication systems is the ability to establish ubiquitous and seamless access to various Radio Access Technologies (RATs) and standards. For this reason the integration of cellular and Wireless Local Area Networks (WLANs) and performance evaluation of the interaction between these technologies is...

Polymorphic and metamorphic malware use code obfuscation techniques to construct new variants which preserve the semantics of the original but change the code syntax, evading current compiled code based detection methods. Dynamic slicing is a technique that, given a variable of interest within a program, isolates a relevant subset of...

The analysis presented in the paper uses algebraic and geometric methods to explore the implications of the two different specifications of the customer's value equation, the ratio approach and the subtractive approach, for customer behaviour and strategic marketing decisions. Three key concepts are defined and investigated for each specification of...

The Next Generation Internet will provide ubiquitous computing by the seamless operation of heterogeneous wireless networks. It will also provide support for quality-of-service, QoS, fostering new classes of applications and will have a built-in multi-level security environment. A key requirement of this new infrastructure will be support for efficient vertical...

Mobile IP enables mobile computers to roam transparently in any network. However, the current proposed protocol specification does not support a suitable handoff mechanism to allow a mobile computer to change its point of attachment from one network to another. This paper describes a handoff mechanism for a mobile host...

In order to achieve seamless interoperability in heterogeneous networking, it is vital to improve the context-awareness of the Mobile Node (MN) so that it is able to predict future network conditions with sufficient accuracy. In this paper, the authors introduce a predictive mathematical model for calculating the estimated Time Before...

The growth over the last decade in the use of wireless networking devices has been explosive. Soon many devices will have multiple network interfaces, each with very different characteristics. The authors believe that a framework that encapsulates the key challenges of heterogeneous networking is required. Like a map clearly helps...

This paper considers retransmission mechanisms in wireless regenerative relay networks. The retransmission can be realized in a cooperative manner with the assistance of all available relays. This may result in high overall power consumption due to a considerable number of overlapped packets in the retransmission, especially when the number of...

There is no credible methodology for Knowledge Management Systems Development (KMSD). The authors report on a KMSD approach that has emerged from an investigation based on action research and grounded theory into a number of business problems experienced by organizations. The KMSD approach is highly participatory, requiring full involvement of...

The Next Generation Internet will provide ubiquitous computing by the seamless operation of heterogeneous wireless networks. It will also provide support for quality-of-service, QoS, fostering new classes of applications and will have a built-in multi-level security environment. A key requirement of this new infrastructure will be support for efficient vertical...

The analysis presented in the paper uses algebraic and geometric methods to explore the implications of the two different specifications of the customer's value equation, the ratio approach and the subtractive approach, for customer behaviour and strategic marketing decisions. Three key concepts are defined and investigated for each specification of...

3D virtual worlds, such as Second Life, are increasingly being used for delivering e-learning for different genres of students. As part of an ongoing research to evaluate different digital design aspects of using these emergent virtual learning environments, the aim of this paper is to investigate whether the overall satisfaction...

The main feature of the next generation wireless communication systems is the ability to establish ubiquitous and seamless access to various Radio Access Technologies (RATs) and standards. For this reason the integration of cellular and Wireless Local Area Networks (WLANs) and performance evaluation of the interaction between these technologies is...

Multi-channel MAC protocols have recently obtained considerable attention in wireless networking research because they promise to increase capacity of wireless networks significantly by exploiting multiple frequency bands. In this paper, the authors do a comparison between IEEE 802.11 and IEEE 802.15.4 and investigate the performance between both using simulations conducted...

Polymorphic and metamorphic malware use code obfuscation techniques to construct new variants which preserve the semantics of the original but change the code syntax, evading current compiled code based detection methods. Dynamic slicing is a technique that, given a variable of interest within a program, isolates a relevant subset of...

Unlike current closed systems such as 2nd and 3rd generations where the core network is controlled by a sole network operator, multiple network operators will coexist and manage the core network in Next Generation Networks (NGNs). This open architecture and the collaboration between different network operators will support ubiquitous connectivity...

Being able to understand human behaviour and monitoring daily life activities is seen as a significant approach for alleviating functional decline among elderly people. The aim of this paper is to investigate a mechanism that can recognise high level activities and behaviour of low entropy people in order to help...

The hitherto limited interpretation of service as deployed in IT value creation and solutions implementation is perhaps a reason why so few IT projects are seen to have successful business outcomes. There are strong indications that the commonly used measures of quality and performance have never been adequate for complex...

Business and ICT strategic alignment remains an ongoing challenge facing organizations as they react to changing requirements by adapting or introducing new technologies to existing infrastructure. Enterprise Architecture (EA) has increasingly become relevant to these demands and as a consequence numerous methods and frameworks have emerged. However these approaches remain...

Energy efficiency is the main concern of research community while designing routing protocols for Wireless Sensor Networks (WSNs). This concern can be addressed by using energy-harvesting scheme in routing protocols. In this paper, the authors propose a secure routing protocol that is based on cross layer design and energy-harvesting mechanism....

The Locator/ID Separation Protocol (LISP) is a routing architecture that provides new semantics for IP addressing. In order to simplify routing operations and improve scalability in future Internet, the LISP uses two different numbering spaces to separate the device identifier from its location. In other words, the LISP separates the...

Cloud computing has been visualized as the next generation architecture of IT enterprise. In contrast to traditional solutions, where the IT services are under proper physical, logical and personnel controls, cloud computing moves the application software and databases to the large data centers, where the management of the data and...

Server cluster is one of the clustering technologies; it is use for the improvement of the PC's performance; cluster use for the high performance of computing system. It is based on the model of the cluster architecture. This model is refers that how servers manage in the cluster. Server cluster...

Seamless connectivity in 4G wireless networks requires the development of intelligent proactive mechanisms for efficiently predicting vertical handovers. Random device mobility patterns further increase the complexity of the handover process. Geographical topologies such as indoor and outdoor environments also exert additional constraints on network coverage and device mobility. The ability...

Mobile IP enables mobile computers to roam transparently in any network. However, the current proposed protocol specification does not support a suitable handoff mechanism to allow a mobile computer to change its point of attachment from one network to another. This paper describes a handoff mechanism for a mobile host...

In order to achieve seamless interoperability in heterogeneous networking, it is vital to improve the context-awareness of the Mobile Node (MN) so that it is able to predict future network conditions with sufficient accuracy. In this paper, the authors introduce a predictive mathematical model for calculating the estimated Time Before...

Security for Next Generation Networks (NGNs) is an attractive topic for many research groups. The Y-Comm security group believes that a new security approach is needed to address the security challenges in 4G networks. This paper sheds light on the authors' approach of providing security for the Y-Comm architecture as...

An increasingly wireless world will mean that devices with multiple network interfaces will soon become commonplace. Users will expect to be always connected from anywhere and at any time as connections will be switched to available networks using handover techniques. However, different networks have different Qualities of Service (QoS) so...

In this paper, the authors present a new analytical model to enhance the modeling of vertical handover for integrated cellular/WLAN systems. The WLAN system considered is within the coverage area of cellular network; hence users can have a downward vertical handover to the WLAN and/or an upward vertical handover to...

The growth over the last decade in the use of wireless networking devices has been explosive. Soon many devices will have multiple network interfaces, each with very different characteristics. The authors believe that a framework that encapsulates the key challenges of heterogeneous networking is required. Like a map clearly helps...

Mobile devices with two network interfaces (Wi-Fi and 3G) are already commercially available. Point-to-point communications such as Infrared and Bluetooth are also readily used. In the near future, mobile phones will have several interfaces including satellite and new technologies such as ultra wideband. Hence, the authors must assume that such...

Submit Your Content

Get your content listed in our directory for free!

Our directory is the largest library of vendor-supplied technical content on the web. It's also the first place IT decision makers turn to when researching technology solutions. Our members are already finding your competitors' papers here - shouldn't they find yours too?